No Password Required: Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a World-Class Awkward Hugger
Digital Planning Podcast Episode: When Cyber Attacks Hit Home
Overview of Cybersecurity in Government Contracts
Cybersecurity: What Healthcare Providers Need to Know
No Password Required: The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.
2022 DSIR Deeper Dive: NFTs
No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure
Webinar Recording - Crypto Breaches: Legal & Regulatory Update
No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
Defense In-Depth: Cybersecurity For Energy
Greetings and Felicitations - Aly McDevitt on Ransomware Case Study, Part 2
Not If, but When: A Data Protection Roadmap for Legal Teams in a Post-Pandemic World
How to Protect your Organization From a Cybersecurity Attack
Phishing: Cybersecurity’s Biggest Threat
No Password Required: An Infowar Expert Paved the Path From Rock-And-Roll to Cybersecurity
Cybersecurity & Data Privacy Webinar Series: Password Protected: Essential Cybersecurity & Data Privacy Planning for Your Small Business
CF on Cyber: The Anatomy of a Ransomware Attack - Part 2
CF on Cyber: The Anatomy of a Ransomware Attack - Part 1
Fighting Cyber Crime: The $1 Trillion Invisible Threat
Major Crypto Exchanges Launch New Products, Obtain Foreign Licenses - According to a recent company blog post, a major U.S. cryptocurrency exchange has launched a new staking product that will allow clients residing in...more
Civil and criminal litigation heated up this summer in high-profile crypto matters that will affect crypto projects moving forward. For their quarterly crypto lit update, partner David Feder and associates Rebecca...more
As the Web3 and digital assets ecosystem continues to grow, hacks, scams and other threats remain a major cause for concern and a potential impediment to broader adoption. Data from various sources indicates that after a year...more
EigenLayer TVL Surpasses $20B; New Self-Custodial Wallet Features Launch - According to recent reports, the total value locked (TVL) on the Ethereum network-based EigenLayer restaking protocol recently surpassed $20...more
TradFi/DeFi Integrations Announced, Yield-Bearing Stablecoin Launches - According to reports, Robinhood, a major U.S. financial services company, has entered into an agreement to acquire Bitstamp, a global cryptocurrency...more
District Court Upholds Tornado Cash Sanctions, DOJ Charges Founders - On August 17, a Texas federal court found that Tornado Cash, a crypto mixer (which obscures the source of crypto transactions) is an entity that can be...more
New ERC-4337 Smart Contract Standard Released to Enhance Wallet Security - According to reports, Ethereum has deployed a new feature known as “account abstraction,” which has been in development for two years and can “make...more
Crypto-asset transactions are rapidly growing in popularity. However, a surge of cybersecurity breaches and hacker attacks on cryptocurrency exchanges and cryptocurrency wallet service providers has caused billions of dollars...more
The hack of the Hong-Kong based crypto-exchange Bitfinex has been described as the “heist of the century”. Where a crypto-asset is in play in litigation, in particular as a potential target for enforcement, parties should be...more